<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 13.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/after-15-years-is-free-access-to-law-here-to-stay"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/openness/blog-old/2012-conference-on-trends-in-knowledge-information-dynamics"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online">
    <title>Does the Safe-Harbor Program Adequately Address Third Parties Online?</title>
    <link>http://editors.cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online</link>
    <description>
        &lt;b&gt;While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data.  Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem. &lt;/b&gt;
        
&lt;p&gt;To date, the EU-US Safe Harbor Program leads in governing
the complex and multi-directional flows of personal information online. &amp;nbsp;&amp;nbsp;As commerce began to thrive in the online
context, the European Union was faced with the challenge of ensuring that personal
information exchanged through online services were granted
levels of protect on par with provisions set out in EU privacy law.&amp;nbsp; This was important, notably as the piecemeal
and sectoral approach to privacy legislation in the United states was deemed incompatible
with the EU approach.&amp;nbsp; While the Safe
Harbor program did not aim to protect the privacy of citizens outside of the
European Union per say, the program has in practice set minimum standards for
online data privacy due to the international success of American online
services.&lt;/p&gt;

&lt;p&gt;While many citizens outside of the US and EU benefit from
the Safe Harbor Program, it remains unclear how successful the program will be in an
online ecosystem where third-parties are being granted increasingly more rights
over the data they receive from first parties.&amp;nbsp;
Using Facebook as a site of analysis, I will attempt to shed light on
the deficiencies of the framework for addressing the complexity of data flows
in the online ecosystem.&amp;nbsp; First, I will argue
that the safe harbor program does not do enough to ensure that participants are
held reasonably responsible third party privacy practices.&amp;nbsp; Second, I will argue that the information
asymmetries created between first party sites, citizens, and governance bodies
vis-à-vis third parties obscures the application of the Safe Harbor Model.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The EU-US
Safe-Harbor Agreement&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In 1995, and based on earlier &lt;a href="http://www.oecd.org/document/18/0,3343,en_2649_34255_1815186_1_1_1_1,00.html"&gt;OECD
guidelines&lt;/a&gt;, the EU Data Directive on the “protection of individuals with
regard to the processing of personal data and the free movement of such data”
was passed&lt;a name="_ednref1" href="#_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [1].&amp;nbsp; The original purpose of the EU Privacy
Directive was not only to increase privacy protection within the European
Union, but to also promote trade liberalization and a single integrated market
in the EU.&amp;nbsp; After the Data Directive was
passed, each member state of the EU incorporated the principles of
the directive into national laws accordingly.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the Directive was successful in harmonizing data
privacy in the European Union, it also embodied extraterritorial
provisions, giving in reach&lt;a name="_ednref2" href="#_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; beyond the EU.&amp;nbsp; Article 25 of the Directive states that the
EU commission may ban data transfers to third countries that do not ensure “an
adequate level of protect’ of data privacy rights&lt;a name="_ednref3" href="#_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [2].&amp;nbsp; Also, Article 26 of the Directive, expanding
on Article 25, states that personal data cannot be &lt;em&gt;transferred &lt;/em&gt;to a country that “does not ensure an adequate level of
protection” if the data controller does not enter into a contract that adduces
adequate privacy safeguards&lt;a name="_ednref4" href="#_edn4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [3].
&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In light of the increased occurrence of cross-border
information flows, the Data Directive itself was not effective enough to ensure that
privacy principles were enforced outside of the EU.&amp;nbsp; Articles 25 and 26 of the Directive had essentially deemed all cross-border data-flows to the US in contravention of EU privacy law.&amp;nbsp; Therefor, the EU-US Safe-Harbor was established by the
EU Council and the US Department of Commerce as a way of mending the variant
levels of privacy protection set out in these jurisdictions, while also promoting
online commerce.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Social Networking
Sites and the Safe-Harbor Principles&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The case of social networking sites exemplifies the ease
with which data is transferred, processed, and stored between jurisdictionas.&amp;nbsp; While many of the top social networking sites
are registered American entities, they continue to attract users not only from
the EU, but also internationally.&amp;nbsp; In agreement
to the EU law, many social networking sites, including LinkedIn, Facebook,
Myspace, and Bebo, now adhere to the principles of the program.&amp;nbsp; The enforcement of the Safe Harbor takes
place in the United States in accordance with U.S. law and relies, to a great
degree, on enforcement by the private sector.&amp;nbsp;
TRUSTe, an independent certification program and dispute mechanism, has become the most popular governance mechanism for the safe harbor program
among social networking sites.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Drawing broadly on the principles embodied within the EU
Data Directive and the OECD Guidelines, the seven principles of the Safe-Harbor
were developed.&amp;nbsp; These principles include
Notice, Choice, Onward Transfer, Access and Accuracy, Security, Data Integrity
and Enforcement.&amp;nbsp;&amp;nbsp; The principle of “Notice”
sets out that organizations must inform individuals about the purposes for
which it collects and uses information about them, how to contact the
organization with any inquiries or complaints, the types of third parties to
which it disclosures the information, and the choices and means the organization
offers individuals for limiting its use and disclosure.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“Choice” ensures that individuals have the opportunity to
choose to opt out whether their personal information is disclosed to a third
party, and to ensure that information is not used for purposes incompatible with the purposes for
which it was originally collected.&amp;nbsp; The
“Onward Transfer” principle ensures that third parties receiving information
subscribes to the Safe Harbor principles, is subject to the Directive, or
enters into a written agreement which requires that the third party provide at
least the same level of privacy protection as is requires by the relevant
principles.&lt;/p&gt;
&lt;p&gt;The principles of “Security” and “Data Integrity” seek to
ensure that reasonable precautions are taken to protect the loss or misuse of
data, and that information is not used in a manner which is incompatible with
the purposes for it is has been collected—minimizing the risk that personal
information would be misused or abused.&amp;nbsp;&amp;nbsp;&amp;nbsp;
Individuals are also granted the right, through the access principle, to
view the personal information about them that an organization holds, and to
ensure that it is up-to-date and accurate.&amp;nbsp;
The “Enforcement” principle works to ensure that an effective mechanism
for assuring compliance with the principles, and that there are consequences
for the organization when the principles are not followed.&lt;/p&gt;
&lt;p&gt;The principles of the program are rather quite clear and
enforceable in the first party context, despite some prevailing ambiguities.&amp;nbsp; The privacy policies of most social
networking services have become increasingly clear and straightforward since
their inception.&amp;nbsp; Facebook, for example,
has revamped its &lt;a href="http://www.facebook.com/privacy/explanation.php"&gt;privacy
regime&lt;/a&gt; several times, and gives explicit notice to users how their
information is being used.&amp;nbsp; The privacy
policy also explains the relationship between third parties and your personal information—including
how it may be used by advertisers, search engines, and fellow members.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With respect to third party advertisers, principles of
“choice” are clearly granted by most social networking services.&amp;nbsp; For example, the &lt;a href="http://www.networkadvertising.org/"&gt;Network Advertising Initiative&lt;/a&gt;, a
self-regulatory initiative of the online advertising industry, clearly lists
its member websites and allows individuals to opt out of any targeted
advertising conducted by its members.&amp;nbsp; In
Facebook’s description of “cookies” in their privacy policy, a direct link to NAI’s
opt out features is given, allowing individuals to make somewhat informed
choices about their participation in such programs.&amp;nbsp; This point is, of course, in light of the
fact that most users do not read or understand the privacy policies provided by
social networking sites&lt;a name="_ednref5" href="#_edn5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [4].
It is also important to note that Google—a major player in the online
advertising business, does not grant users of Buzz and Orkut the same “opt-out”
options as sites such as Facebook and Bebo.&lt;/p&gt;
&lt;p&gt;Under the auspices of the US Federal Trade Commission, the
Safe Harbor Program has also successfully investigated and settled several
privacy-related breaches which have taken place on social networking sites.&amp;nbsp; Of the most famous cases is &lt;a href="http://www.beaconclasssettlement.com/"&gt;Lane et al. v. Facebook et al.&lt;/a&gt;,
which was a class action suit brought against Facebook’s Beacon Advertising
program.&amp;nbsp; The US Federal Trade Commission
was quick to insight an investigation of the program after many privacy groups
and individuals became critical of its questionable advertising practices.&amp;nbsp; The Beacon program was designed to allow
Facebook users to share information with their friends about actions taken on
affiliated, third party sites.&amp;nbsp; This had included,
for example, the movie rentals a user had made through the Blockbuster website.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Plaintiffs filed a suit, alleging that Facebook and its
affiliates did not give users adequate notice and choice about Beacon and the
collection and use of users’ personal information. &amp;nbsp;&amp;nbsp;&amp;nbsp;The Beacon program was ultimately found to
be in breach of US law, including the &lt;a href="http://epic.org/privacy/vppa/"&gt;Video
Privacy Protection Act&lt;/a&gt;, which bans the disclosure of personally identifiable
rental information.&amp;nbsp; Facebook has
announced the settlement of the lawsuit, not bringing individual settlements,
but a marked end to the program and the development of a 9.5 million dollar &lt;a href="http://www.p2pnet.net/story/37119"&gt;Facebook Privacy Fund&lt;/a&gt; dedicated to
privacy and data-related issues.&amp;nbsp; Other privacy
related investigations of social networking sites launched by the FTC under the
Safe Harbor Program include Facebook’s &lt;a href="http://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changes-good-bad-and-ugly"&gt;privacy
changes&lt;/a&gt; in late 2009, and the Google’s recently released &lt;a href="http://www.networkworld.com/news/2010/032910-lawmakers-ask-for-ftc-investigation.html"&gt;Buzz
application&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Despite the headway the Safe Harbor is making, many privacy
related questions remain ambiguous with respect to the responsibilities social networking
sites through the program.&amp;nbsp; For example,
Bebo &lt;a href="http://www.bebo.com/Privacy2.jsp"&gt;reserves the right&lt;/a&gt; to
supplement a social profile with addition information collected from publicly
available information and information from other companies.&amp;nbsp; Bebo’s does adhere to the “notice principle”—as
it makes know to users how their information will be used through their privacy
policy. However, it remains unclear if appropriate disclosures are given by Bebo
as required by Safe Harbor Framework, notably as the sources of “publicly
available information” as a concept remains broad and obscured in the privacy policy.&amp;nbsp; It is also unclear whether or not Bebo users
are able to, under the “Choice” principle, refuse to having their profiles from
being supplemented by other information sources.&amp;nbsp; Also, under the “access
principle”, do individuals have the right to review all information held about them as “Bebo
users”?&amp;nbsp; The right to review information
held by a social networking site is an important one that should be upheld.&amp;nbsp; This is most notable as supplementary information
from outside social networking services is employed &amp;nbsp;to profile individual users in ways which may
work to categorize individuals in undesirable ways.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Third Party Problem&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Cooperation between social networking sites and the Safe
Harbor has improved, and most of these sites now have privacy policies which
explicitly address the principles of the Program.&amp;nbsp;&amp;nbsp; It should also be noted that public interest
groups, such as Epic, the Center for Digital Democracy, and The Electronic
Frontier Foundation, have played a key role in ensuring that data privacy
breaches are brought to the attention of the FTC under the program.&amp;nbsp; While the program has somewhat adequately
addressed the privacy practices of first party participants, the number of
third parties on social networking sites calls into question the
comprehensiveness and effectiveness of the Safe Harbor program.&amp;nbsp; Facebook itself as a first party site may adhere
to the Safe Harbor Program.&amp;nbsp; However, its
growing number third party platform members may not always adhere to best practices
in the field, nor can Facebook or the Safe Harbor Program guarantee that they
do so.&lt;/p&gt;
&lt;p&gt;The Safe Harbor Program does require that all participants
take certain security measures when transferring data to a third party.&amp;nbsp; Third parties must either subscribe to the
safe harbor principles, or be subject to the EU Data Directive.&amp;nbsp; Alternatively, an organization can may also
enter into a written agreement with a third party requiring that they provide
at least the same level of privacy protection as is required by program
principles.&amp;nbsp; Therefore, third parties of
participating program sites are, de facto, bound by the safe harbor principles by
the way of entering into agreement with a first party participant of the
program. &amp;nbsp;This is the approach taken by
most social networking sites and their third parties.&lt;/p&gt;
&lt;p&gt;It is important to note, however, that third parties are not
governed directly by the regulatory bodies, such as the FTC.&amp;nbsp; The safe harbor website also &lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp"&gt;explicitly notes&lt;/a&gt;
that the program does not apply to third parties.&amp;nbsp; Therefore, as per these provisions, Facebook must
adhere to the principles of the program, while its third party platform members
(such as social gaming companies), only must do so indirectly as per a separate
contract with Facebook.&amp;nbsp; The
effectiveness of this indirect mode of governing of third party privacy
practices is questionable for numerous reasons.&lt;/p&gt;
&lt;p&gt;Firstly, while Facebook does take steps to ensure that
third parties use information from Facebook in a manner which is consistent to
the safe harbor principles, the company explicitly &lt;a href="http://www.facebook.com/policy.php"&gt;waives any guarantee&lt;/a&gt; that third
parties will “follow their rules”. &amp;nbsp;&amp;nbsp;Prior to allowing third parties to access any
information about users, Facebook requires third parties to &lt;a href="http://www.facebook.com/terms.php"&gt;agree to terms&lt;/a&gt; that limit their
use of information, and also use technical measures to ensure that they only
obtain authorized information.&amp;nbsp;&amp;nbsp; Facebook
also warns users to “always review the policies of third party applications and
websites to make sure you are comfortable with the ways in which they use
information”.&amp;nbsp; Not only are users
required to read the privacy policies of every third party application, but are
also expected to report applications which may be in violation of privacy
principles.&amp;nbsp; In this sense, Facebook not
only waives responsibility for third party privacy breaches, but also places further
regulatory onus upon the user.&lt;/p&gt;
&lt;p&gt;As the program guidelines express, the safe harbor relies to
a great degree on enforcement by the private sector.&amp;nbsp; However, it is likely that a self-regulatory
framework may lead the industry into a state of regulatory malaise.&amp;nbsp; Under the safe harbor program, Facebook must
ensure that the privacy practices of third parties are adequate.&amp;nbsp; However, at the same time, the company may
simultaneously waiver their responsibility for third party compliance with safe
harbor principles.&amp;nbsp; Therefore, it remains
questionable as to where responsibility for third parties exactly lies.&amp;nbsp; When third parties are not directly
answerable to the governing bodies of safe harbor program, and when first parties
can to waive responsibility for their practices, from where does the incentive to
effectively regulate third parties to come from?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While Facbeook may in fact take reasonable legal and technical
measures to ensure third party compliance, the room for potential dissonance
between speech and deed&amp;nbsp; is worrisome.&amp;nbsp; Facebook is required to ensure that third
parties provide “&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp"&gt;at least the same
level of privacy protection&lt;/a&gt;” as they do.&amp;nbsp;
However, in practice, this has yet to become the case.&amp;nbsp; A quick survey of twelve of the most popular
Platform Applications in the gaming category showed&lt;a name="_ednref6" href="#_edn6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
that third parties are not granting their users the “same level of privacy
protection”[5].&amp;nbsp; For example, section 9.2.3
of Facebooks “&lt;a href="http://www.facebook.com/terms.php"&gt;Rights and
Responsibilities&lt;/a&gt;” for Developers/Operators of applications/sites states
that they must “have a privacy policy or otherwise make it clear to users what
user data you are going to use and how you will use, display, or share that
data”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, out of the 12 gaming applications surveyed, four
companies failed to make privacy policies available to users &lt;em&gt;before&lt;/em&gt; they granted the application
access to the personal information, including that of their friends&lt;a name="_ednref7" href="#_edn7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [6].&amp;nbsp; After searching for the privacy policies on
the websites of each of the four social gaming companies, two completely failed
to post privacy policies on their central websites. &amp;nbsp;&amp;nbsp;This practice is in direct breach of the
contract made between these companies and Facebook, as mentioned above.&amp;nbsp; In addition to many applications failing to clearly
post privacy policies, many of provisions set out in these policies were
questionable vis-à-vis safe harbor principles.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For example Zynga, makes of popular games Mafia Wars and
Farmville, reserve the right to “maintain copies of your content
indefinitely”.&amp;nbsp; This practice remains contrary
to Safe Harbor principles which states that information should not be kept for
longer than required to run a service.&amp;nbsp;
Electronic Arts also maintains similar provisions for data retention in
its privacy policy.&amp;nbsp;&amp;nbsp; Such practices are
rather worrisome also in light of the fact that both companies also reserve the
right to collect information on users from other sources to supplement profiles
held.&amp;nbsp; This includes (but is not limited
to) newspapers and Internet sources such as blogs, instant messaging services, and
other games.&amp;nbsp;&amp;nbsp; It is also notable to
mention that only one of the twelve social gaming companies surveyed directly
participates in the safe harbor program.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to the difficulties of ensuring that safe harbor
principles are adhered to by third parties, the information asymmetries which
exist between first party sites, citizens, and governance bodies vis-à-vis
third parties complicate this model.&amp;nbsp; Foremost,
it is clear that Facebook, despite its resources, cannot keep tabs on the
practices of all of their applications.&amp;nbsp;&amp;nbsp;
This puts into question if industry self-regulation can really guarantee
that privacy is respected by third parties in this context.&amp;nbsp; Furthermore, the lack of knowledge or
understanding held by citizens about how third parties user their information
is particularly problematic when a system relies so heavily on users to report
suspected privacy breaches.&amp;nbsp; The same is
likely to be true for governments, too.&amp;nbsp; As
one legal scholar, promoting a more laisse-fair approach to third party
regulation, notes—multiple and invisible third party relationships presents
challenges to traditional forms of legal regulation&lt;a name="_ednref8" href="#_edn8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [7].&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In an “open “social ecosystem, the sheer volume of data
flows between users of social networking sites and third party players appears
to have become increasingly difficult to effectively regulate.&amp;nbsp; While the safe harbor program has been
successful in establishing best practices and minimum standards for data
privacy, it is also clear that governance bodies, and public interest groups,
have focused most attention on large industry players such as Facebook.&amp;nbsp; This has left smaller third party players on
social networking sites in the shadows of any substantive regulatory concern.&amp;nbsp; &amp;nbsp;&amp;nbsp;If
one this has become clear, it is the fact that governments may no longer be
able to effectively govern the flows of data in the burgeoning context of “open
data”.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As I have demonstrated, it remains questionable whether or
not Facebook can regulate third parties data collection practices
effectively.&amp;nbsp; Imposing more stringent
responsibilities on safe harbor participants could be a positive step.&amp;nbsp; It is reasonable to assume that it would be
undue to impose liability on social networking sites for the data breaches of
third parties.&amp;nbsp; However, it is not
unreasonable to require sites like Facebook go beyond setting “minimum
standards” for data privacy, towards taking a more active enforcement, if even
through TRUSTe or another regulatory body.&amp;nbsp;
If the safe harbor is to be effective, it cannot allow program participants
to simply wave the liability for third party privacy practices.&amp;nbsp; The indemnity granted to third parties on social
networking sites may deem the safe harbor program more effective in sustaining
the non-liability of third parties, rather than protecting the data privacy of
citizens.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="33%" /&gt;

&lt;/div&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn1" href="#_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[1] Official Directive 95/46/EC&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn2" href="#_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn3" href="#_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[2] 95/46/EC&lt;/p&gt;
&lt;p class="discreet"&gt;[3] Ibid&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn4" href="#_ednref4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a name="_edn5" href="#_ednref5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/a&gt;[4] See Acquisit,
A. a. (n.d.). Imagined Communities: Awareness, Information Sharing, and Privacy
on Facebook. &lt;em&gt;PET 2006&lt;/em&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn6" href="#_ednref6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[5] Of the Privacy Policy browsed include, Zynga, Rock
You!, Crowdstar, Mind Jolt, Electronic Arts, Pop Cap Games, Slash Key, Playdom,
Meteor Games, Broken Bulb Studios, Wooga, and American Global Network.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn7" href="#_ednref7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[6] By adding an application, users are also sharing with
third parties the information of their friends if they do not specifically &amp;nbsp;opt out of this practice.&lt;/p&gt;
&lt;p class="discreet"&gt;[7]See&lt;strong&gt;
&lt;/strong&gt;&amp;nbsp;Milina, S. (2003).
Let the Market Do its Job: Advocating an Integrated Laissez-Faire Approach to
Online Profiling. &lt;em&gt;Cardozo Arts and Entertainment Law Journal&lt;/em&gt; .&lt;/p&gt;
&lt;pre&gt;&lt;/pre&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online'&gt;http://editors.cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2011-08-02T07:19:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/after-15-years-is-free-access-to-law-here-to-stay">
    <title>After 15 Years, Is Free Access to Law Here to Stay?</title>
    <link>http://editors.cis-india.org/openness/blog-old/after-15-years-is-free-access-to-law-here-to-stay</link>
    <description>
        &lt;b&gt;CIS, in collaboration with partners LexUM and SAFLII, is undertaking a Global Free Access to Law Study.  Being the first of its kind within the Free Access to Law Movement, this comparative study will examine what free access to law initiatives do, evaluate their core benefits and identify factors determining of their sustainability.   In the end, the free access to law study will provide future initiatives and existing LII networks with proven and adoptable best practices which will support the continued growth of the legal information commons.&lt;/b&gt;
        
&lt;p&gt;The question in the title is the
driving force behind a joint research initiative the Centre for
Internet and Society has recently undertaken in collaboration with pioneering institutions, &lt;a class="external-link" href="http://www.lexum.org"&gt;LexUM&lt;/a&gt;,and the &lt;a class="external-link" href="http://www.saflii.org"&gt;South African Legal Information Institute&lt;/a&gt;.&amp;nbsp; Over the past fifteen years, institutions providing free access to
legal materials have transformed the modes in which legal information
is produced and used. However, there have been few analyses of the
ways in which legal information repositories operate. Lessons
learned, best practices and successful models have not been
systematically documented, and administrators may not have access to
useful guidance or peer support. The study will bridge this gap by
analyzing a variety of free access to law initiatives around the
world in greater detail.&lt;/p&gt;
&lt;p&gt;In 1992, the first Legal Information
Institute (LII) at Cornell University began to place primary sources
of law and interpretive legal materials online, free of charge.&amp;nbsp; The &lt;a class="external-link" href="http://www.worldlii.org"&gt;Free Access to Law Movement&lt;/a&gt;
soon expanded to form a broad network of LIIs who shared the belief
that legal information is &lt;a class="external-link" href="http://www.worldlii.org/worldlii/declaration/"&gt;digital common property and should be accessible to all&lt;/a&gt;.
 Today, citizens around the world can access legal information in
multiple languages through easily searchable databases. Among the
resources available are statutes, bills, court decisions, bilateral
treaties, law journal articles, legal reform documents and much more.
This freely available legal information has helped make the law more
accessible to audiences previously underserved by costly commercial
databases, and has allowed comparative legal research to become more
practicable than ever before.&lt;/p&gt;
&lt;p&gt;Research will focus on gauging the
broader societal effects of free access to law initiatives, as well
as on understanding the diverse factors which contribute to or
undermine their sustainability.The CIS will be overseeing research in
Asia, while SAFLII and LexUM will cover South and West Africa, the
South Pacific, Canada and Australia.  The global scope of the study
will facilitate the sharing of expertise and best practices within
the global network of LIIs.&lt;/p&gt;
&lt;p&gt;The value of creating a legal
information commons has been clearly demonstrated. Access to legal
materials helps to strengthen judicial systems, improve legal
expertise, guide policymaking and maintain the rule of law. Legal
transparency helps businesses assess risk and encourage
entrepreneurship. Citizens and civil society actors require access to
law to participate in the political process and assert their rights.
These audiences form an important constituency for open access to
legal scholarship and demonstrate the need to further examine the
core benefits of free access to law initiatives.&lt;/p&gt;
&lt;p&gt;Online free access to legal materials
has also been an indispensable tool in underserved regions where a
host of factors often undermine access to legal information.  The
following examples, derived from preliminary CIS research throughout
Asia, demonstrate how free access to law can bridge various gaps in
legal information accessibility.  In some cases, laws may be
completely unavailable.  For example, bureaucrats may demand bribes
before allowing access to copies of a law, or governments may wish to
keep certain implementing guidelines or regulations a secret. In
other cases, a law might have simply been lost through lack of proper
storage or record-keeping.&lt;/p&gt;
&lt;p&gt;A second problem occurs when laws and
case law are available only in certain locations or certain forms. A
law may be available only in hard copy or in one or two libraries in
the capital city, for example. This causes difficulties for citizens
and practitioners in remote areas who lack the resources to travel.
Sometimes, the libraries containing the legal information also may
require special permissions to access. In other instances, legal
materials may have been digitized but not properly stored or
networked.&lt;/p&gt;
&lt;p&gt;Digitizing and uploading laws to
organized, searchable databases presents its own challenges, and some
governments lack the technical capacity to do so. However, digitizing
and uploading laws does not guarantee general public access. In some
countries, laws may be online but placed in pay-per-use databases.
And some governments retain a copyright or similar intellectual
property rights in their laws and other documents. This may mean that
NGOs or LIIs cannot copy, consolidate, or re-post certain legal
information without exposing themselves to copyright liability.  The
commercialization of legal information also restricts access to
individuals and firms able to pay costly subscription fees.&lt;/p&gt;
&lt;p&gt;Copyright and the commercialization of
legal information can inhibit the free flow of legal
information—notably when legal information can be better organized,
preserved and disseminated further under more open standards. 
Because of the importance of free access to law, a significant focus
of the research will be to identify factors that contribute to the
sustainability and success of free access to law initiatives.  This
is of great importance in Asia, where the local capacities of LIIs
require further strengthening before their databases can begin to
rival their commercial counterparts.&lt;/p&gt;
&lt;p&gt;Many &lt;a class="external-link" href="http://law.bepress.com/unswwps/flrps/art42/"&gt;challenges&lt;/a&gt;
remain for the development and sustainability of free access to law
initiatives in the Asian region.  Searchable legal information must
be provided in both English and regional languages, while local
technical capacities require further development.  Mariya
Badeva-Bright
of SAFLII also &lt;a class="external-link" href="http://blog.law.cornell.edu/voxpop/2009/07/15/is-free-access-to-law-here-to-stay/"&gt;notes&lt;/a&gt; that LIIs need to secure working partnerships
within the judicial branch of government in order to reduce the
burdens of digitization and to promote common standards in
preparation of legal material. The AsianLII has only begun to scrape
the surface of valuable legal information that is potentially
available and must continue to develop and strengthen  partnerships
in the region.&lt;/p&gt;
&lt;p&gt;	The study will have several concrete
results.   Upon completion of the study, a Free Access to Law Best
Practices Handbook will be published and will serve as a
comprehensive knowledge resource for both existing and nascent free
access law initiatives.  The handbook will outline various steps in
creating and maintaining successful free access to law initiatives,
while ensuring that important aspects of design and sustainability
are not overlooked.  Also, a comprehensive online library will host
current and future materials relating to the free access to law
movement, including a collection of free access to law case studies.&lt;/p&gt;
&lt;p&gt;Research by the CIS, LexUM, SAFLII,
and their respective team of researchers is expected to commence
within the next few months.&amp;nbsp; In the end, the free access to law study will provide
future initiatives and existing LII networks with proven and
adoptable best practices.  This research will increase the chance
that nascent initiatives will be successful, and support the
continued growth of the thriving legal information commons.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/after-15-years-is-free-access-to-law-here-to-stay'&gt;http://editors.cis-india.org/openness/blog-old/after-15-years-is-free-access-to-law-here-to-stay&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2011-08-18T05:07:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/openness/blog-old/2012-conference-on-trends-in-knowledge-information-dynamics">
    <title>2012 Conference on Trends in Knowledge Information Dynamics</title>
    <link>http://editors.cis-india.org/openness/blog-old/2012-conference-on-trends-in-knowledge-information-dynamics</link>
    <description>
        &lt;b&gt;The 2012 Conference on Trends in Knowledge Information Dynamics convened a panel on Open Access. There was consensus amongst the panelist that the “big question” facing the open access movement no longer remains "if" or "why" open access, but rather "how" open access. The panel proved instructive for shifting the discussion away from ideology towards concrete questions facing the open access agenda and its implementation. &lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year’s&lt;a class="external-link" href="http://drtc.isibang.ac.in/ictk/subthemes"&gt; International Conference on Trends in Knowledge Information Dynamics&lt;/a&gt; held in Bangalore brought together a panel of speakers who discussed the accomplishments of and future challenges facing the open access movement.  There was an air of consensus amongst the panelists that the “big question” facing the OA movement today no longer remains &lt;i&gt;if&lt;/i&gt; or &lt;i&gt;why&lt;/i&gt; open access, but rather &lt;i&gt;how&lt;/i&gt; open access&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;[1]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.  The speakers did a good job of moving the discussion beyond ideology or proof of principle and used the panel to discuss some of the challenges facing the OA agenda and its implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More than ten years after the launch of the Budapest Open Access Initiative, the benefits of open access have been demonstrated through countless studies. Studies have demonstrated an increased impact factor for authors who self archive, for those who self-archive early, those who publish in OA journals, as well as for journals that have gone OA. Other studies have shown the benefits of open models for facilitating scientific collaboration and stimulating the knowledge economy; creating new opportunities for both big business and start-ups alike. Further, open models of publishing—both green and gold—are well recognized today as attractive alternatives for research institutions and universities seeking local and sustainable solutions for internal intellectual property management. In light of &lt;span class="msoIns"&gt;&lt;ins cite="mailto:Natasha%20Vaz" datetime="2012-07-17T16:08"&gt;&lt;/ins&gt;&lt;/span&gt;this mounting body of evidence, policy makers and administration can no longer overlook the benefits of OA for the visibility and impact of their institution, faculty and research publications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fortunately, the wealth of studies demonstrating the benefits of OA for both the STM and HSS disciplines have grabbed the attention of national and international policy makers. On the international stage, models of scholarly research and communication that privilege the open sharing of knowledge are proving more favorable to closed models which remained (relatively) unresponsive to shifting scholarly needs and practices. The presentations given by  Alma Swan from Key Perspectives Ltd and of Dr. Carlos Morais Pires of the European Commission reminded us that OA is no longer an fringe matter confined to the esoteric concerns of tech-savvy physicists. Both the unsustainable increase in journal licensing fees and the opportunities presented through digital publishing methods has allowed OA to emerge as a mainstream public policy issue. Leading inter-governmental institutions such as the World Bank, UNESCO and the European Commission have all committed themselves to the OA agenda through a range of initiatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The World Bank, for example, now releases all of their publications under the CC-BY license and deposits them within their Open Knowledge Repository. UNESCO continues to support the movement through capacity building initiatives such as policy guidelines and through the Global Open Access Portal. The European Unions’ recent “Digital Agenda” report has firmly recognized the importance of the OA movement to the European economy. Additionally, the Commission’s launch of the “OpenAIRE” repository has set an important valuable precedent and it is hoped that this move will encourage more organizations from the EU to maintain their own institutional repositories. With the support of big players like UNESCO and the European Commission, it remains probable that OA will continue to find its way into the policy agendas of more universities and funding agencies. This high level policy support has certainly reinforced the legitimacy of the OA movement and has proven valuable for the “open” shift in scholarly communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As support for OA continues to gain momentum at the international level, an environmental scan reveals a conducive—if not promising—environment for the future growth of open access in India.  Indeed, the success the OA movement has seen to date is a cause for optimism in itself. However, these accomplishments must not obviate the real need for continued advocacy in India at all levels. At the national level, the Knowledge Commission of India has shown support for the OA agenda. The agenda has also been taken up by the Council on Scientific and Industrial Research in the form of a council recommendation and a growing network of institutional repositories. At the university level, the National Institute of Oceanography Goa and the National Institute of Technology Rourkela remain the only two institutions which have demonstrated a thorough and long-term commitment to OA in a &lt;i&gt;policy-based&lt;/i&gt; capacity. Consequently, both institutions continue to witness growth of their repositories thanks to the support of administrative and library staff. However, it must be recognized that other institutional repositories in India continue to grow at impressive rates, even in the absence of a strong policy base.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recognizing that most OA enthusiasts agree both upon the need for and benefits of OA, Dr. Norbert Lossau of the Geottingen State Library, Germany, reminded us of the need to focus less on reconfirming the known and taking advantage of opportunities to address concrete questions around implementation. Lossau’s presentation provided a concise and action-oriented framework for moving the OA agenda forward. In particular, he emphasized the need for resource reallocation within library units in order to provide the required institutional support for OA and also underlined importance of capacity and network building among actors who might be working in isolation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the inertia of many faculty and researchers in Indian universities and research institutions, more needs to be done at the policy level before OA can be said to enjoy mainstream success. Given the scope of the task ahead, Dr K Kanikaram Satyanarayana, Deputy Director General of ICMR reminds us that the changing landscape of scholarly communication may not lend indefinite and central importance to the scholarly journal and consequently, the OA movement. Recent internet-based innovations in scholarly publishing—such as the “PLOS Currents” project—reveals how the instantaneity of the digital research environment is inciting greater demand for raw data. Researchers no longer appear willing to wait for the publication of peer-reviewed articles in order to test and build upon the work of their peers. With related issues like open data moving center stage in the “openness” debate, it remains unclear if access to scholarly literature as a &lt;i&gt;finished product&lt;/i&gt; and &lt;i&gt;medium &lt;/i&gt;of scholarly communication—will remain a priority for policy makers in the long term.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the challenges ahead, champions of OA—in any context—need not, nor should not, do it alone. While recognizing the challenges related to maintaining global networks, the panel discussion served as an important reminder that the long-term success of any OA initiative rests in its’ ability to plug into regional, sub-regional and global networks. Global network building does not, however, imply that India need only integrate themselves into established networks (which are more often than not grounded in the Western experience). While greater representation and participation of advocates from the South would certainly be of benefit, it is also important that the distinct needs and conditions of scholarly communication in the Global South are not left unaddressed. Facilitating a truly &lt;i&gt;global&lt;/i&gt; exchange of knowledge and building long-lasting south-south collaborations remains an important task ahead. This is particularly important if the Global South is to be recognized as more than mere “beneficiaries” of the OA and also receive visibility as knowledge producers.&lt;/p&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;span class="MsoFootnoteReference"&gt;&lt;span class="MsoFootnoteReference"&gt;[1]&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; Phrase popularized by Neelie Kroes of the EC, in support of OA&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/openness/blog-old/2012-conference-on-trends-in-knowledge-information-dynamics'&gt;http://editors.cis-india.org/openness/blog-old/2012-conference-on-trends-in-knowledge-information-dynamics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-07-18T10:47:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
